Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying natural images and computer generated graphics based on binary similarity measures of PRNU., , and . Multimedia Tools Appl., 78 (1): 489-506 (2019)Outage performance of double-relay cooperative transmission network with energy harvesting., and . Phys. Commun., (2018)基于区块链的环境监测数据安全传输方案 (Secure Transmission Scheme for Environmental Monitoring Data Based on Blockchain)., and . 计算机科学, 47 (1): 315-320 (2020)Securing data services: a security architecture design for private storage cloud based on HDFS., , , , and . Int. J. Grid Util. Comput., 4 (4): 242-254 (2013)A Facial Privacy Protection Framework Based on Component Difference and Template Morphing., , , and . ICCCN, page 1-9. IEEE, (2020)3-D Printed Object Authentication Based on Printing Noise and Digital Signature., , and . IEEE Trans. Reliab., 68 (1): 342-353 (2019)HEGrid: A High Efficient Multi-Channel Radio Astronomical Data Gridding Framework in Heterogeneous Computing Environments., , , , , and . CoRR, (2022)BullyNet: Unmasking Cyberbullies on Social Networks., , , and . IEEE Trans. Comput. Soc. Syst., 8 (2): 332-344 (2021)A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates., , , and . Multim. Tools Appl., 78 (19): 26885-26905 (2019)S-Box Design Based on Discrete Chaotic Map and Improved Artificial Bee Colony Algorithm., and . IEEE Access, (2021)